Wireless Security Architecture

by Jennifer Minella

Cybersecurity

Book Details

Book Title

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise

Author

Jennifer Minella

Publisher

Wiley

Publication Date

2022

ISBN

9781119883050

Number of Pages

806

Language

English

Format

PDF

File Size

9.18MB

Subject

Cybersecurity

Table of Contents

  • Contents
  • Cover
  • Title Page
  • Foreword
  • Preface
  • Introduction
  • Part I: Technical Foundations
  • Chapter 1: Introduction to Concepts and Relationships
  • Roles and Responsibilities
  • Security Concepts for Wireless Architecture
  • Wireless Concepts for Secure Wireless Architecture
  • Summary
  • Chapter 2: Understanding Technical Elements
  • Understanding Wireless Infrastructure and Operations
  • Understanding Data Paths
  • Understanding Security Profiles for SSIDs
  • Summary
  • Chapter 3: Understanding Authentication and Authorization
  • The IEEE 802.1X Standard
  • RADIUS Servers, RADIUS Attributes, and VSAs
  • Change of Authorization and Disconnect Messages
  • EAP Methods for Authentication
  • MAC-Based Authentications
  • Certificates for Authentication and Captive Portals
  • Captive Portal Security
  • LDAP Authentication for Wi-Fi
  • The 4-Way Handshake in Wi-Fi
  • Summary
  • Chapter 4: Understanding Domain and Wi-Fi Design Impacts
  • Understanding Network Services for Wi-Fi
  • Understanding Wi-Fi Design Impacts on Security
  • Summary
  • Part II: Putting It All Together
  • Chapter 5: Planning and Design for Secure Wireless
  • Planning and Design Methodology
  • Planning and Design Inputs (Define and Characterize)
  • Planning and Design Outputs (Design, Optimize, and Validate)
  • Correlating Inputs to Outputs
  • Planning Processes and Templates
  • Notes for Technical and Executive Leadership
  • Summary
  • Chapter 6: Hardening the Wireless Infrastructure
  • Securing Management Access
  • Designing for Integrity of the Infrastructure
  • Controlling Peer-to-Peer and Bridged Communications
  • Best Practices for Tiered Hardening
  • Additional Security Configurations
  • Summary
  • Part III: Ongoing Maintenance and Beyond
  • Chapter 7: Monitoring and Maintenance of Wireless Networks
  • Security Testing and Assessments of Wireless Networks
  • Security Monitoring and Tools for Wireless
  • Logging, Alerting, and Reporting Best Practices
  • Troubleshooting Wi-Fi Security
  • Training and Other Resources
  • Summary
  • Chapter 8: Emergent Trends and Non-Wi-Fi Wireless
  • Emergent Trends Impacting Wireless
  • Enterprise IoT Technologies and Non-802.11 Wireless
  • Final Thoughts from the Book
  • Appendices
  • Appendix A: Notes on Configuring 802.1X with Microsoft NPS
  • Appendix B: Additional Resources
  • Appendix C: Sample Architectures
  • Appendix D: Parting Thoughts and Call to Action
  • Index
  • Copyright
  • Dedication
  • About the Author
  • About the Technical Editor
  • Acknowledgments
  • End User License Agreement